PatchSiren cyber security CVE debrief
CVE-2026-43384 Git CVE debrief
CVE-2026-43384 is a critical Linux kernel vulnerability in the TCP Authentication Option (TCP-AO) path. The fix changes MAC comparison to a constant-time helper to prevent timing attacks. In practical terms, an attacker able to exercise the affected network path could potentially learn information from data-dependent comparison timing. The supplied record rates the issue CVSS 9.8 (Critical).
- Vendor
- Git
- Product
- Unknown
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-08
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-08
- Advisory updated
- 2026-05-11
Who should care
Linux kernel maintainers, distro security teams, appliance and embedded vendors shipping Linux kernels, and operators of systems that use or expose TCP-AO. Network-security teams should prioritize this if TCP-AO is enabled in production or on internet-facing systems.
Technical summary
The CVE description says the Linux kernel's net/tcp-ao code compared MACs in a way that was not constant time. Because MAC verification should not vary its runtime based on how much of the value matches, the resolved change uses the appropriate constant-time comparison helper. The issue is therefore a timing-side-channel risk in authentication verification logic rather than a memory corruption flaw.
Defensive priority
Urgent; treat as critical and prioritize kernel patching/backport verification immediately.
Recommended defensive actions
- Apply the vendor or distribution kernel update that includes the TCP-AO constant-time MAC comparison fix.
- Verify any backports in stable kernel branches include the net/tcp-ao timing fix before deployment.
- Prioritize exposed or high-trust systems that use TCP-AO for authentication.
- If TCP-AO is not required on a system, restrict or disable its use until patched.
- Track downstream advisories from your Linux distribution or kernel vendor for exact fixed versions.
Evidence notes
This debrief is based on the CVE description stating that net/tcp-ao needed constant-time MAC comparison, plus the official NVD record and its four kernel.org stable commit references. The supplied NVD metadata shows vulnStatus as 'Received' and CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, consistent with a remotely reachable critical issue.
Official resources
-
CVE-2026-43384 CVE record
CVE.org
-
CVE-2026-43384 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published 2026-05-08 and last modified 2026-05-11 in the supplied record. No CISA KEV entry is listed in the provided data.